ves-io-schema-secret_policy-API-Create
On This Page:
Examples of creating secret_policy
Usecase:
Create secret-policy-1
Request using vesctl:
vesctl configuration create secret_policy -i secret_policy.yaml
where file secret_policy.yaml has following contents (secret_policy.CreateRequest):
RequestJSON:
{
"metadata": {
"name": "secret-policy-1",
"namespace": "documentation"
},
"spec": {
"decrypt_cache_timeout": "604800s",
"legacy_rule_list": {
"rules": [
{
"kind": "secret_policy_rule",
"name": "secret-policy-rule-1"
},
{
"kind": "secret_policy_rule",
"name": "secret-policy-rule-2"
}
]
}
}
}
vesctl yaml response:
ResponseJSON:
{
"metadata": {
"name": "secret-policy-1",
"namespace": "documentation",
"labels": {},
"annotations": {},
"description": "",
"disable": false
},
"system_metadata": {
"uid": "0357d61e-b9ee-44a0-8077-efcf19554038",
"creation_timestamp": "2024-03-21T14:06:55.692369Z",
"deletion_timestamp": null,
"modification_timestamp": null,
"initializers": null,
"finalizers": [],
"tenant": "acmecorp",
"creator_class": "examplesvc",
"creator_id": "examplesvc",
"object_index": 0,
"owner_view": null,
"labels": {}
},
"spec": {
"algo": "FIRST_MATCH",
"rules": [],
"allow_f5xc": false,
"decrypt_cache_timeout": "604800s",
"marked_for_delete": false,
"deletion_time": null,
"legacy_rule_list": {
"rules": [
{
"kind": "secret_policy_rule",
"uid": "ffffffff-ffff-ffff-ffff-ffffffffffff",
"tenant": "acmecorp",
"namespace": "documentation",
"name": "secret-policy-rule-1"
},
{
"kind": "secret_policy_rule",
"uid": "ffffffff-ffff-ffff-ffff-ffffffffffff",
"tenant": "acmecorp",
"namespace": "documentation",
"name": "secret-policy-rule-2"
}
]
}
}
}
Request using curl:
curl -X 'POST' -d '{"metadata":{"name":"secret-policy-1","namespace":"documentation"},"spec":{"decrypt_cache_timeout":"604800s","legacy_rule_list":{"rules":[{"kind":"secret_policy_rule","name":"secret-policy-rule-1"},{"kind":"secret_policy_rule","name":"secret-policy-rule-2"}]}}}' -H 'Content-Type: application/json' -H 'X-Volterra-Useragent: v1/pgm=_var_folders_2__8qnt6fwd5dvglr1xqq6l8b7w0000gp_T_go-build3109416560_b001_apidocs.test/host=C02FN35BMD6R/svc=S:examplesvc/site=mytestce01' 'https://acmecorp.console.ves.volterra.io/api/secret_management/namespaces/documentation/secret_policys'
curl response:
HTTP/1.1 200 OK
Content-Length: 1310
Content-Type: application/json
Date: Thu, 21 Mar 2024 14:06:55 GMT
Vary: Accept-Encoding
{
"metadata": {
"name": "secret-policy-1",
"namespace": "documentation",
"labels": {
},
"annotations": {
},
"description": "",
"disable": false
},
"system_metadata": {
"uid": "0357d61e-b9ee-44a0-8077-efcf19554038",
"creation_timestamp": "2024-03-21T14:06:55.692369Z",
"deletion_timestamp": null,
"modification_timestamp": null,
"initializers": null,
"finalizers": [
],
"tenant": "acmecorp",
"creator_class": "examplesvc",
"creator_id": "examplesvc",
"object_index": 0,
"owner_view": null,
"labels": {
}
},
"spec": {
"algo": "FIRST_MATCH",
"rules": [
],
"allow_f5xc": false,
"decrypt_cache_timeout": "604800s",
"marked_for_delete": false,
"deletion_time": null,
"legacy_rule_list": {
"rules": [
{
"kind": "secret_policy_rule",
"uid": "ffffffff-ffff-ffff-ffff-ffffffffffff",
"tenant": "acmecorp",
"namespace": "documentation",
"name": "secret-policy-rule-1"
},
{
"kind": "secret_policy_rule",
"uid": "ffffffff-ffff-ffff-ffff-ffffffffffff",
"tenant": "acmecorp",
"namespace": "documentation",
"name": "secret-policy-rule-2"
}
]
}
}
}